A novel quantum deniable authentication protocol without entanglement

A novel quantum deniable authentication protocol without entanglement
Shi, Wei-Min; Zhang, Jian-Biao; Zhou, Yi-Hua; Yang, Yu-Guang
2015-04-18 00:00:00
A novel quantum deniable authentication protocol based on single photons is proposed. In this scheme, the message sender and the specified receiver will first agree a new shared secret key by key update phases with the help of a third center, where only they can encrypt and decrypt the message by using the new shared secret key. Hence, this scheme can guarantee that only the specified receiver can identify the true source of a given message and the specified receiver cannot prove the source of the message to a third party by a transcript simulation algorithm. Compared with our previous scheme (Shi et al. in Quantum Inf Process 13:1501–1510, 2014), this scheme has the remarkable advantages of the higher qubit efficiency and consuming fewer quantum resources. Finally, security analysis results show that this scheme satisfies known key security and the basic security requirements of deniable authentication protocol such as completeness and deniability, and can withstand forgery attack, impersonation attack and inter-resend attack.
http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.pngQuantum Information ProcessingSpringer Journalshttp://www.deepdyve.com/lp/springer-journals/a-novel-quantum-deniable-authentication-protocol-without-entanglement-m0iIa40eIj

Abstract

A novel quantum deniable authentication protocol based on single photons is proposed. In this scheme, the message sender and the specified receiver will first agree a new shared secret key by key update phases with the help of a third center, where only they can encrypt and decrypt the message by using the new shared secret key. Hence, this scheme can guarantee that only the specified receiver can identify the true source of a given message and the specified receiver cannot prove the source of the message to a third party by a transcript simulation algorithm. Compared with our previous scheme (Shi et al. in Quantum Inf Process 13:1501–1510, 2014), this scheme has the remarkable advantages of the higher qubit efficiency and consuming fewer quantum resources. Finally, security analysis results show that this scheme satisfies known key security and the basic security requirements of deniable authentication protocol such as completeness and deniability, and can withstand forgery attack, impersonation attack and inter-resend attack.

Journal

Quantum Information Processing
– Springer Journals

Published: Apr 18, 2015

Recommended Articles

Loading...

References

Quantum identification system

DuŠek, M; Haderka, O; Hendrych, M

Quantum authentication of classical messages

Curty, M; Santos, DJ

Quantum identification schemes with entanglements

Mihara, T

Identity verification in quantum key distribution

Zeng, GH; Zhang, WP

Authority-based user authentication in quantum key distribution

Ljunggren, D; Bourennane, M; Karlsson, A

Cross-center quantum identification scheme based on teleportation and entanglement swapping

Zhou, NR; Zeng, GH; Zeng, WJ

Secure authentication of classical messages with decoherence-free states